Protecting Cloud Users and Data Across the Entire Network with Expanded Cloud Services

Protecting Cloud Users and Data Across the Entire Network with Expanded Cloud Services

Protecting Cloud Users and Data Across the Entire Network with Expanded Cloud Services

Protecting Cloud Users and

Data Across the Entire Network

with Expanded Cloud Services

Protecting Cloud Users and

Data Across the Entire Network

with Expanded Cloud Services

By:
投稿者:
Joe Malenfant
November 18, 2020

Private and trusted networks are obsolete. Workloads have shifted from clients, servers, and endpoints to the public cloud making it more essential than ever to protect your cloud users and data. Network proliferation has created a network comprised of cloud application and services, IoT devices, as well as your data center and enterprise network. Across the network, identity has become the perimeter.

This new perimeter cannot be protected by legacy network security that relies on signatures and anomaly detection. Increasing numbers of remote workers and the legions of IoT devices that access corporate networks make both traditional network security solutions like intrusion detection and prevention systems (IDPS)  and endpoint detection and response (EDR) blind to cloud data and activity.

In a new study conducted by 451 Research, part of S&P Global Market Intelligence, 57% of enterprises reported that they’ve either already deployed or are implementing hybrid cloud environments that blend on-premises systems with cloud-based services.

Vectra uniquely protects the entire network of cloud, hybrid, and enterprise connectivity with our AI-derived machine learning behavioral models that understand the behaviors of hosts, user accounts, and identities—tracking and stopping attackers early in the attack lifecycle.

Securing data in cloud environments

Current security approaches lose visibility when environments expand to the cloud, where users leverage multiple different accounts and access resources from shadow IT devices. Historically, users and hosts were on-premises in the enterprise and subject to strict controls.

The enhanced capabilities from Vectra illustrate, track, and link all host and account interactions between the cloud and enterprise under one consolidated view to dramatically reduce the risk of a data breach and protect your cloud data.

The rise of targeted account-credential attacks negates email security, multi-factor authentication (MFA), cloud access security brokers (CASBs), and other threat-prevention approaches that are designed to protect users. These malicious account-credential attacks look like legitimate user actions to these threat-prevention approaches.

Vectra detects attacks by analyzing the trail of how hosts, user accounts, and workloads are accessed. By leveraging data from both identity provider (IdP) services such as Azure AD and cloud applications like Office 365, Vectra’s patented machine learning models detect attacker behaviors as early as possible during the attack lifecycle

The Cognito network detection and response (NDR) platform from Vectra seamlessly integrates with software as a service (SaaS) applications like Office 365, infrastructure as a service (IaaS) providers, and cloud virtualization platforms, giving visibility into who is accessing it, regardless of how and where.

Only the Cognito NDR platform can detect and stop threats across the entire network whether that’s cloud-based SaaS applications, data center, IoT devices, as well as hybrid and enterprise environments. Its detection capabilities—combined with native integrations to disable accounts and isolate endpoints and workloads—allow security teams to swiftly stop any attacks in the whole network before a data breach occurs.

If you want to see all this for yourself, you can get a 30-day free trial here.

About the author

Joe Malenfant

Joe Malenfant is the Vice President of Product Marketing at Vectra. Joe and his team are responsible for creating differentiated position for Vectra’s solutions, providing clarity to prospects, customers, and partners. Joe has spent over 10 years driving innovation in cyber security including endpoint detection and response, industrial control systems (ICS), IoT, and network security. He has launched category defining products from pure play SaaS to hardware solutions for IT, IoT, and ICS environments. He regularly presents at industry conference including RSA, Cisco Live, and IIoT World.

Prior to Vectra, he led marketing for Cisco’s Internet of Things business, a $1B portfolio spanning over 5 product segments including cloud, networking, and security. Prior to joining Cisco in 2014 he led product and solutions marketing Lockheed Martin Commercial cyber security solutions through the acquisition of ICS security company, Industrial Defender. Joe holds an MBA from Johnson & Wales in Providence, RI and an undergraduate degree from Concordia University in Montreal, Canada.

Author profile and blog posts

Most recent blog posts from the same author

Cybersecurity

5 Things You Need to Know About Ransomware as a Service Groups like DarkSide

June 22, 2021
Read blog post
Threat detection

Vectra Introduces Detect for AWS: Threat Detection and Response for IaaS and PaaS | Vectra AI

June 16, 2021
Read blog post
Infrastructure

Protecting Cloud Users and Data Across the Entire Network with Expanded Cloud Services

November 18, 2020
Read blog post